Russia Military Power
Вівторок, 4 Липень 2017 19:46![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Перепост допису
jonathan_simba: Russia Military Power
Аналитический доклад наших братьев и союзников из US Defense Intelligence Agency (разведывательного управления министерства обороны США) - "Военная мощь России" ("Russia Military Power") (на английском языке).
Свеженький, опубликован 28.06.2017... Крайне рекоммендуем к прочтению.
Уникальность этого издания в том, что оно является первым открытым (не под грифом ограниченного доступа) докладом из серии обзорных аналитических докладов, касающихся главных угроз национальной безопасности США и глобальной безопасности. Обещают, что будут ещё.
Блоггерствующей публике будут особо интересны страницы с 37 по 42. Особенное внимание - на с. 39-40:
One of the newest tools in Russia’s information toolkit is the use of cyber-enabled psychological operations that support its strategic and tactical information warfare objectives. These new techniques involve compromising networks for intelligence information that could be used to embarrass, discredit, or falsify information. Compromised material can then be leaked to the media at inopportune times.
• Hacktivists. Russian intelligence services have been known to co-opt or masquerade as other hacktivist groups. These groups appeal to Russia due to the difficulty of attribution and the level of anonymity provided. It is widely accepted that Russia, via patriotic hackers, conducted a cyber attack on Estonia in 2007. Under the guise of hacktivism, a group called “CyberCaliphate,” seemingly ISIS associated, conducted a hack against French station TV5 Monde in January 2015. The CyberCaliphate group was later linked to Russian military hackers. The same group hijacked the Twitter feed of the U.S. Central Command.
• CyberBerkut – A False Persona. Russian hackers also use false personas. CyberBerkut is a front organization for Russian state-sponsored cyber activity, supporting Russia’s military operations and strategic objectives in Ukraine. CyberBerkut employs a range of both technical and propaganda attacks, consistent with the Russian concept of “information confrontation.” Since emerging in March 2014, CyberBerkut has been implicated in multiple incidents of cyber espionage and attack, including distributed denial of service attacks against NATO, Ukraine, and German government websites. More recently, it has focused on the online publication of hacked documents, ostensibly obtained from the Ukrainian government and political figures’ computers. CyberBerkut uses information gained through these hacks to discredit the Ukrainian government. The intent is to demoralize, embarrass, and create distrust of elected officials.
• Trolls. Russia employs a troll army of paid online commentators who manipulate or try to change the narrative of a given story in Russia’s favor. Russia’s Troll Army, also known as the Internet Research Agency, is a state-funded organization that blogs and tweets on behalf of the Kremlin. Trolls typically post pro-Kremlin content and facilitate heated discussions in the comments sections of news articles. Their goal is to counter negative media and “Western influence.” While the goal of some trolls is to simply disrupt negative content, other trolls promote completely false content.
• Bots. Another way Russia manipulates the information space is through the use of bots. Bots are automated pushers of content on social media. These bots vary in sophistication and can continuously push content or imitate real life patterns. Bots can drown out unwanted content or push a specific message. Bots have the ability to overwhelm the information space and discourage readers from looking for real content.
Короче, Х%йла и его банду уже прямым текстом обвиняют в терроризме (в т.ч. маскирующемся под "исламистский") и кибертерроризме, раскрывая некоторые их связи и методы их деятельности. Если такое пишут в открытых документах, то могу себе представить, как их обстоятельно обкладывают в документах закрытых...
P.S.: Хм, вижу, наши украинские материалы они тоже читали... Молодцы, это делает им честь.
Продолжаем трудиться, приближая нашу победу!
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)

Свеженький, опубликован 28.06.2017... Крайне рекоммендуем к прочтению.
Уникальность этого издания в том, что оно является первым открытым (не под грифом ограниченного доступа) докладом из серии обзорных аналитических докладов, касающихся главных угроз национальной безопасности США и глобальной безопасности. Обещают, что будут ещё.
Блоггерствующей публике будут особо интересны страницы с 37 по 42. Особенное внимание - на с. 39-40:
One of the newest tools in Russia’s information toolkit is the use of cyber-enabled psychological operations that support its strategic and tactical information warfare objectives. These new techniques involve compromising networks for intelligence information that could be used to embarrass, discredit, or falsify information. Compromised material can then be leaked to the media at inopportune times.
• Hacktivists. Russian intelligence services have been known to co-opt or masquerade as other hacktivist groups. These groups appeal to Russia due to the difficulty of attribution and the level of anonymity provided. It is widely accepted that Russia, via patriotic hackers, conducted a cyber attack on Estonia in 2007. Under the guise of hacktivism, a group called “CyberCaliphate,” seemingly ISIS associated, conducted a hack against French station TV5 Monde in January 2015. The CyberCaliphate group was later linked to Russian military hackers. The same group hijacked the Twitter feed of the U.S. Central Command.
• CyberBerkut – A False Persona. Russian hackers also use false personas. CyberBerkut is a front organization for Russian state-sponsored cyber activity, supporting Russia’s military operations and strategic objectives in Ukraine. CyberBerkut employs a range of both technical and propaganda attacks, consistent with the Russian concept of “information confrontation.” Since emerging in March 2014, CyberBerkut has been implicated in multiple incidents of cyber espionage and attack, including distributed denial of service attacks against NATO, Ukraine, and German government websites. More recently, it has focused on the online publication of hacked documents, ostensibly obtained from the Ukrainian government and political figures’ computers. CyberBerkut uses information gained through these hacks to discredit the Ukrainian government. The intent is to demoralize, embarrass, and create distrust of elected officials.
• Trolls. Russia employs a troll army of paid online commentators who manipulate or try to change the narrative of a given story in Russia’s favor. Russia’s Troll Army, also known as the Internet Research Agency, is a state-funded organization that blogs and tweets on behalf of the Kremlin. Trolls typically post pro-Kremlin content and facilitate heated discussions in the comments sections of news articles. Their goal is to counter negative media and “Western influence.” While the goal of some trolls is to simply disrupt negative content, other trolls promote completely false content.
• Bots. Another way Russia manipulates the information space is through the use of bots. Bots are automated pushers of content on social media. These bots vary in sophistication and can continuously push content or imitate real life patterns. Bots can drown out unwanted content or push a specific message. Bots have the ability to overwhelm the information space and discourage readers from looking for real content.
Короче, Х%йла и его банду уже прямым текстом обвиняют в терроризме (в т.ч. маскирующемся под "исламистский") и кибертерроризме, раскрывая некоторые их связи и методы их деятельности. Если такое пишут в открытых документах, то могу себе представить, как их обстоятельно обкладывают в документах закрытых...
P.S.: Хм, вижу, наши украинские материалы они тоже читали... Молодцы, это делает им честь.
Продолжаем трудиться, приближая нашу победу!
...
Дата: Середа, 5 Липень 2017 07:45 (UTC)...
Дата: Середа, 5 Липень 2017 11:58 (UTC)